Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Basic security concepts and terminology
- Public Key Infrastructure defined
- Digital certificates and signatures
- Smart cards and hardware tokens
- PKI standards and global frameworks
Basic Cryptography
- Uses of cryptography in modern systems
- History of cryptography and evolution of algorithms
- Symmetric vs. asymmetric encryption
- Diffie-Hellman key exchange
- Hashing for data integrity
Practical Uses for Encryption and Associated Issues
- Signed and encrypted email (S/MIME and PGP)
- Secure web connections (HTTPS/SSL)
- Digitally signing PDFs and documents
- File, disk, and container encryption
- VPNs, wireless encryption, and cloud security
- Encryption attacks and mitigation strategies
Certificate Authorities and Certificate Lifecycle
- Public vs. private certificate authorities
- Regulatory compliance and CA policy frameworks
- Types of certificates and their uses
- CA hierarchies and trust chains
- Operations: issuing, renewing, and revoking certificates
- Revocation methods: CRL and OCSP
- Key recovery and certificate templates
- Installing and managing a CA
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority)
- Use of CSCA in Machine Readable Travel Documents (MRTDs)
- ICAO PKD and global trust frameworks for ePassports
- Implementing a national CSCA hierarchy
- Certificate Master Lists and Document Signer Certificates
- Security, compliance, and international alignment
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned
- Top 10 risks and recommended mitigation strategies
- Quantum-resistant cryptography and evolving standards
- Zero Trust Architecture and PKI integration
- Future trends in digital identity and trust frameworks
Summary and Next Steps
Requirements
- Familiarity with networking fundamentals
- Basic understanding of cryptography concepts
- General awareness of enterprise security policies
Audience
- CIOs and Chief Security Officers
- Security managers and internal auditors
- IT professionals involved in implementing and securing e-commerce and enterprise systems
21 Hours